2019
DOI: 10.1109/access.2019.2927863
|View full text |Cite
|
Sign up to set email alerts
|

A Flexible Sketch-Based Network Traffic Monitoring Infrastructure

Abstract: Sketch-based data streaming algorithms are used in many network traffic monitoring applications to obtain accurate estimates of traffic flow statistics. However, the current implementation of sketch-based methods in network monitoring is too application-specific. Their flexibility is limited as the hardware implementation of sketch data structure in the network device depends on the measurement tasks. The sketch counters only summarize flow statistics that are relevant to a specific measurement task and cannot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(2 citation statements)
references
References 46 publications
0
2
0
Order By: Relevance
“…the supported queries. Data summaries-Sketches: Another approach for computing network summaries are sketches, e.g., [73], [34], [74] as well as systems that utilize sketches for network monitoring and debugging [75], [25], [35], [76], [77]. The capabilities of sketches include counting, top-K, HH, as well as HHH.…”
Section: State Of the Artmentioning
confidence: 99%
“…the supported queries. Data summaries-Sketches: Another approach for computing network summaries are sketches, e.g., [73], [34], [74] as well as systems that utilize sketches for network monitoring and debugging [75], [25], [35], [76], [77]. The capabilities of sketches include counting, top-K, HH, as well as HHH.…”
Section: State Of the Artmentioning
confidence: 99%
“…Existing sketches used to measure host cardinalities are in a form of two-dimension [1]- [3], [32], [34], which can only monitor a single type of host cardinality. Applying application-specific cardinality measurement methods are not flexible because we need to construct sketches with many different keys, which cannot satisfy the requirements of global network security measurement [35]. Moreover, the one-pass constraint of big-volume traffic data brings additional challenges to simultaneously measure various types of host cardinalities [22], [36].…”
Section: Introductionmentioning
confidence: 99%